"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-09 21:01:32 +00:00
parent 153c223bfc
commit e5984966f7
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
3 changed files with 160 additions and 138 deletions

View File

@ -1,70 +1,72 @@
{ {
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-1287", "ID": "CVE-2022-1287",
"TITLE": "School Club Application System resource injection", "TITLE": "School Club Application System resource injection",
"REQUESTER": "cna@vuldb.com", "REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com", "ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"generator": "vuldb.com", "generator": "vuldb.com",
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "", "vendor_name": "",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "School Club Application System", "product_name": "School Club Application System",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "1.0" "version_value": "1.0"
} }
] ]
} }
} }
] ]
} }
} }
] ]
} }
}, },
"problemtype": { "problemtype": {
"problemtype_data": [ "problemtype_data": [
{ {
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-99 Improper Control of Resource Identifiers" "value": "CWE-99 Improper Control of Resource Identifiers"
} }
] ]
} }
] ]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability classified as critical was found in School Club Application System 1.0. This vulnerability affects a request to the file \/scas\/classes\/Users.php?f=save_user. The manipulation with a POST request leads to privilege escalation. The attack can be initiated remotely and does not require authentication. The exploit has been disclosed to the public and may be used." "value": "A vulnerability classified as critical was found in School Club Application System 1.0. This vulnerability affects a request to the file /scas/classes/Users.php?f=save_user. The manipulation with a POST request leads to privilege escalation. The attack can be initiated remotely and does not require authentication. The exploit has been disclosed to the public and may be used."
} }
] ]
}, },
"impact": { "impact": {
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "6.5", "baseScore": "6.5",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:N" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.196750" "url": "https://vuldb.com/?id.196750",
} "refsource": "MISC",
] "name": "https://vuldb.com/?id.196750"
} }
]
}
} }

View File

@ -1,70 +1,72 @@
{ {
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2022-1288", "ID": "CVE-2022-1288",
"TITLE": "School Club Application System cross site scripting", "TITLE": "School Club Application System cross site scripting",
"REQUESTER": "cna@vuldb.com", "REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com", "ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"generator": "vuldb.com", "generator": "vuldb.com",
"affects": { "affects": {
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "", "vendor_name": "",
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name": "School Club Application System", "product_name": "School Club Application System",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value": "1.0" "version_value": "1.0"
} }
] ]
} }
} }
] ]
} }
} }
] ]
} }
}, },
"problemtype": { "problemtype": {
"problemtype_data": [ "problemtype_data": [
{ {
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value": "CWE-79 Cross Site Scripting" "value": "CWE-79 Cross Site Scripting"
} }
] ]
} }
] ]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability, which was classified as problematic, has been found in School Club Application System 1.0. This issue affects access to \/scas\/admin\/. The manipulation of the parameter page with the input %22%3E%3Cimg%20src=x%20onerror=alert(1)%3E leads to a reflected cross site scripting. The attack may be initiated remotely and does not require any form of authentication. The exploit has been disclosed to the public and may be used." "value": "A vulnerability, which was classified as problematic, has been found in School Club Application System 1.0. This issue affects access to /scas/admin/. The manipulation of the parameter page with the input %22%3E%3Cimg%20src=x%20onerror=alert(1)%3E leads to a reflected cross site scripting. The attack may be initiated remotely and does not require any form of authentication. The exploit has been disclosed to the public and may be used."
} }
] ]
}, },
"impact": { "impact": {
"cvss": { "cvss": {
"version": "3.1", "version": "3.1",
"baseScore": "4.3", "baseScore": "4.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N" "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
} }
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https:\/\/vuldb.com\/?id.196751" "url": "https://vuldb.com/?id.196751",
} "refsource": "MISC",
] "name": "https://vuldb.com/?id.196751"
} }
]
}
} }

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-28890",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}